Second-level (or lower-level, depending on the established parent hierarchy) domain names are often created based on the name of a company (e.g., bbc.co.uk), product or service (e.g. hotmail.com). Below these levels, the next domain name component has been used to designate a particular host server. Therefore, ftp.example.com might be an FTP server, www.example.com would be a World Wide Web server, and mail.example.com could be an email server, each intended to perform only the implied function. Modern technology allows multiple physical servers with either different (cf. load balancing) or even identical addresses (cf. anycast) to serve a single hostname or domain name, or multiple domain names to be served by a single computer. The latter is very popular in Web hosting service centers, where service providers host the websites of many organizations on just a few servers.
VPS Hosting: A virtual private server (VPS) setup is like a shared hosting setup on steroids. It generally uses more powerful hardware and takes its name from the fact that while multiple websites are being stored on the same physical hardware, each uses virtualisation software to allow them to operate independently as though they were dedicated mini-servers.
All of this infrastructure has been built out to support the a wide range of hosting services. The family-owned company gains points for understanding the importance of transaction security by offering free AutoSSL and Let's Encrypt SSL encryption for its plans. While the company offers sophisticated services for technically strong clients, it also has a Weebly web builder option to get you up and running quickly.
We’re serious about high security. The latest hardware and software firewalls protect our infrastructure. We diligently tweak and secure the Operating Systems running on our servers. And we constantly scan, probe and test our defense systems to ensure that we’re one of the most secure hosts around. The Namecheap commitment to security means your websites are safer here.
We have a team of dedicated security experts keeping track of daily software vulnerabilities on a server and website level. They actively write security patches and enhancements to prevent possible attacks. In the past year alone, we added 300 custom rules to our Web Application Firewall that stopped multiple identified-yet-unresolved third-party software vulnerabilities.